期刊文献+

Peer-to-Peer计算模型及其安全对策 被引量:1

Peer-to-Peer Computing Model and Security Countermeasure
下载PDF
导出
摘要 介绍了P2P的定义,分析了当前P2P的五个模型的工作原理以及带来的影响,概括了P2P的特性,比较了P2P与传统Client/Server模型的区别。针对P2P技术带来的网络安全挑战,提出了解决P2P网络安全的对策,并着重对如何从信息安全的角度利用基于Agent的自适应技术监控Internet环境中P2P模式下的信息传播进行了探讨。 This article introduces the definition of P2P,analyzes the work principle of current five P2P models and the influence brought by them respectively, summarizes the characteristic of P2P and compares the P2P model and client/server model. P2P security countermeasure is discussed for the challenges brought by P2P.Specially, this article researches how to employ Agentbased adaptive technology to monitor and control the spread of information by P2P in Internet from the view of information security.
出处 《计算机应用研究》 CSCD 北大核心 2003年第3期78-80,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(60073054)
关键词 Peer-to-Peer计算模型 安全对策 网络安全 网络计算 计算机网络 INTERNET P2P Model Security Countermeasure Adaptive Monitor Control
  • 相关文献

同被引文献13

  • 1朱峻茂,杨寿保,樊建平,陈明宇.Grid与P2P混合计算环境下基于推荐证据推理的信任模型[J].计算机研究与发展,2005,42(5):797-803. 被引量:44
  • 2张骞,张霞,文学志,刘积仁,Ting Shan.Peer-to-Peer环境下多粒度Trust模型构造[J].软件学报,2006,17(1):96-107. 被引量:71
  • 3李之棠,祝幼菁,王阜东.一种完全匿名的P2P网络信任模型[J].计算机工程与科学,2006,28(11):9-11. 被引量:2
  • 4KRISHNAN R, SANDHU R, NIU J,et al. Formal models for groupcentric secure information sharing, S-TR-2009-002 [ R ]. San Antonio: Department of Computer Science, The University of Texas, 2009.
  • 5BLAZE M, FEIGENBAUM J, LACY J. Decentralized-trust management[ C ]//Proc of IEEE Symposium on Security and Privacy. Washington DC : IEEE Computer Society, 1996,10 (5) : 164-173.
  • 6HERZBERG A, MASS Y, MIHAELI J, et al. Access control meets public key infrastructure, or assigning roles to strangers [ C ]//Proc of IEEE Symposium on Security and Privacy. California:IEEE Computer Society, 2000 : 2 - 14.
  • 7GAMBETTA D. Trust: making and breaking cooperative relations [M]. Basil Blackwell,1988:213-237.
  • 8HARDIN R. The street-level epistemology of trust[J]. Polit Society, 1993,21 (4) :505-529.
  • 93OSANG A. The beta reputation system [C]//Proc of the 15th Eletronic Commerce Conference. 2002:324-337.
  • 10HUANG J, NICOL D. A calculus of trust and its applications to PKI and identity management [ C ]//Proc of the 8 th Symposium on Identity and Trust on the Internet. New York:ACM Press, 2009:23-37.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部